MFAAPTsecurityawarenessOSDarkWebsmishingFTPantivirusIoTspamfirewallnetworkransomwareDefense-in-depthCyberSecuritysocialengineeringdefenseevasionvulnerabilityescalationrootkitDDoSSyssecAdminadminincidentresponsepasswordcyberattackriskassessmentpassphraseidentitytheftcompliancetrainingSecurityOperationsencryptionBECbotnetbugresiliencezero-dayPHIsecuritypolicywormmalwareHIPAAIOCEDRpacketcryptographyconfidentialityriskhackerPIIvishingProofpointphishingbreachinsiderthreatpentestCIAtriadintegrityIPSVPNexploitspoofingbusinesscontinuityIPincidentavailabilityIDSWISPvirusCyberDefensespywareMFAAPTsecurityawarenessOSDarkWebsmishingFTPantivirusIoTspamfirewallnetworkransomwareDefense-in-depthCyberSecuritysocialengineeringdefenseevasionvulnerabilityescalationrootkitDDoSSyssecAdminadminincidentresponsepasswordcyberattackriskassessmentpassphraseidentitytheftcompliancetrainingSecurityOperationsencryptionBECbotnetbugresiliencezero-dayPHIsecuritypolicywormmalwareHIPAAIOCEDRpacketcryptographyconfidentialityriskhackerPIIvishingProofpointphishingbreachinsiderthreatpentestCIAtriadintegrityIPSVPNexploitspoofingbusinesscontinuityIPincidentavailabilityIDSWISPvirusCyberDefensespyware

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. MFA
  2. APT
  3. security awareness
  4. OS
  5. Dark Web
  6. smishing
  7. FTP
  8. antivirus
  9. IoT
  10. spam
  11. firewall
  12. network
  13. ransomware
  14. Defense-in-depth
  15. Cyber Security
  16. social engineering
  17. defense evasion
  18. vulnerability
  19. escalation
  20. rootkit
  21. DDoS
  22. SyssecAdmin
  23. admin
  24. incident response
  25. password
  26. cyber attack
  27. risk assessment
  28. passphrase
  29. identity theft
  30. compliance
  31. training
  32. Security Operations
  33. encryption
  34. BEC
  35. botnet
  36. bug
  37. resilience
  38. zero-day
  39. PHI
  40. security policy
  41. worm
  42. malware
  43. HIPAA
  44. IOC
  45. EDR
  46. packet
  47. cryptography
  48. confidentiality
  49. risk
  50. hacker
  51. PII
  52. vishing
  53. Proofpoint
  54. phishing
  55. breach
  56. insider threat
  57. pentest
  58. CIA triad
  59. integrity
  60. IPS
  61. VPN
  62. exploit
  63. spoofing
  64. business continuity
  65. IP
  66. incident
  67. availability
  68. IDS
  69. WISP
  70. virus
  71. Cyber Defense
  72. spyware